Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 66 / 76
1513 résultats taggé 2024  ✕
CVE-2024-27198 and CVE-2024-27199: JetBrains TeamCity Multiple Authentication Bypass Vulnerabilities (FIXED) https://www.rapid7.com/blog/post/2024/03/04/etr-cve-2024-27198-and-cve-2024-27199-jetbrains-teamcity-multiple-authentication-bypass-vulnerabilities-fixed/
04/03/2024 21:00:17
QRCode
archive.org
thumbnail

In February 2024, Rapid7’s vulnerability research team identified two new vulnerabilities affecting JetBrains TeamCity CI/CD server:

  • CVE-2024-27198 is an authentication bypass vulnerability in the web component of TeamCity that arises from an alternative path issue (CWE-288) and has a CVSS base score of 9.8 (Critical).
  • CVE-2024-27199 is an authentication bypass vulnerability in the web component of TeamCity that arises from a path traversal issue (CWE-22) and has a CVSS base score of 7.3 (High).
rapid7 EN 2024 research JetBrains TeamCity CVE-2024-27198 CVE-2024-27199
Police seized Crimemarket, the largest German-speaking cybercrime marketplace https://securityaffairs.com/159813/cyber-crime/germany-police-seized-crimemarket.html
04/03/2024 19:26:07
QRCode
archive.org
thumbnail

German police seized the largest German-speaking cybercrime marketplace Crimemarket and arrested one of its operators.

securityaffairs EN 2024 Germany Crimemarket seized police
BlackCat ransomware turns off servers amid claim they stole $22 million ransom https://www.bleepingcomputer.com/news/security/blackcat-ransomware-turns-off-servers-amid-claim-they-stole-22-million-ransom/
04/03/2024 19:18:05
QRCode
archive.org
thumbnail

The ALPHV/BlackCat ransomware gang has shut down its servers amid claims that they scammed the affiliate responsible for the attack on Optum, the operator of the Change Healthcare platform, of $22 million.

bleepingcomputer EN 2024 ALPHV BlackCat Healthcare Optum Ransomware UnitedHealth-Group
Hackers Behind the Change Healthcare Ransomware Attack Just Received a $22 Million Payment https://www.wired.com/story/alphv-change-healthcare-ransomware-payment/
04/03/2024 19:14:36
QRCode
archive.org
thumbnail

The transaction, visible on Bitcoin's blockchain, suggests the victim of one of the worst ransomware attacks in years may have paid a very large ransom.

wired EN 2024 ransomware bitcoin blockchain crime healthcare ALPHV Alphv-BlackCat
Russia’s chief propagandist leaks intercepted German military Webex conversation https://therecord.media/german-air-force-conversation-leaked-russia
04/03/2024 17:10:42
QRCode
archive.org
thumbnail

Russia has been accused of attempting to inflame divisions in Germany by publishing an intercepted conversation in which Bundeswehr officials discuss the country’s support for Ukraine, particularly around the supply of Taurus cruise missiles.

The 38-minute conversation, which took place on February 19, was first published on social media platform Telegram by Margarita Simonyan, the editor-in-chief of RT and a sanctioned propagandist, who said the recording had been provided to her by “comrades in uniform.”

therecord.media EN 2024 Russia Germany air-force leak webex Russia-Ukraine-war
Ubiquiti owners warned Moscow may build another botnet • The Register https://www.theregister.com/2024/02/28/ubiquiti_botnet_second_warning/?is=e4f6b16c6de31130985364bb824bcb39ef6b2c4e902e4e553f0ec11bdbefc118
04/03/2024 13:49:43
QRCode
archive.org
thumbnail

Non-techies told to master firmware upgrades and firewall rules. For the infosec hardheads: have some IOCs

Original joint-cybersecurity-advisory

theregister EN 2024 Ubiquiti-EdgeRouter Ubiquiti joint-advosiry
ALPHV/BlackCat hits healthcare after retaliation threat, FBI says https://www.scmagazine.com/news/alphv-blackcat-hits-healthcare-after-retaliation-threat-fbi-says?is=e4f6b16c6de31130985364bb824bcb39ef6b2c4e902e4e553f0ec11bdbefc118
04/03/2024 12:35:41
QRCode
archive.org
thumbnail

The gang claimed responsibility for a high-profile attack against Change Healthcare Wednesday.

scmagazine EN 2024 CISA ALPHV BlackCat FBI CISA Healthcare
Popular video doorbells can be easily hijacked, researchers find https://techcrunch.com/2024/02/29/popular-video-doorbells-eken-tuck-hijacked-researchers/
03/03/2024 20:23:42
QRCode
archive.org
thumbnail

Walmart and Temu pulled the affected doorbell cameras from their stores. Amazon and others have taken no action.

techcrunch EN 2024 doorbells Walmart IoT EKEN
FBI’s LockBit Takedown Postponed a Ticking Time Bomb in Fulton County, Ga. – Krebs on Security https://krebsonsecurity.com/2024/02/fbis-lockbit-takedown-postponed-a-ticking-time-bomb-in-fulton-county-ga/
03/03/2024 20:20:02
QRCode
archive.org

The FBI’s takedown of the LockBit ransomware group last week came as LockBit was preparing to release sensitive data stolen from government computer systems in Fulton County, Ga. But LockBit is now regrouping, and the gang says it will publish the stolen Fulton County data on March 2 unless paid a ransom. LockBit claims the cache includes documents tied to the county’s ongoing criminal prosecution of former President Trump, but court watchers say teaser documents published by the crime gang suggest a total leak of the Fulton County data could put lives at risk and jeopardize a number of other criminal trials

krebsonsecurity EN 2024 lockbit Fulton-County leak Trump FBI claim
LoanDepot Ransomware Attack Exposed 16.9 Million Individuals - SecurityWeek https://www.securityweek.com/loandepot-ransomware-attack-exposed-16-9-million-individuals/
03/03/2024 20:17:39
QRCode
archive.org

Lending firm LoanDepot said the personal information of 16.9 million individuals was stolen in a ransomware attack in early January 2024.

securityweek EN 2024 LoanDepot ransomware attack data-breach
US prescription market hamstrung for 9 days (so far) by ransomware attack | Ars Technica https://arstechnica.com/security/2024/03/us-prescription-market-hamstrung-for-9-days-so-far-by-ransomware-attack/
03/03/2024 20:08:28
QRCode
archive.org
thumbnail

Patients having trouble getting lifesaving meds have the AlphV crime group to thank.

arstechnica EN 2024 AlphV ransomware US prescription Healthcare
Mail in the middle – a tool to automate spear phishing campaigns https://sensepost.com/blog/2024/mail-in-the-middle-a-tool-to-automate-spear-phishing-campaigns/
03/03/2024 11:32:26
QRCode
archive.org

The idea is simple; take advantage of the typos that people make when they enter email addresses. If we positioned ourselves in between the sender of an email (be it a person or a system) and the legitimate recipient, we may be able to capture plenty of information about the business, including personally identifiable information, email verification processes, etc. This scenario is effectively a Person-in-the-Middle (PiTM), but for email communications.

Orange-Cyberdefence sensepost 2024 EN Typosquatting tool mail domain
Russia publishes German army meeting on Ukraine https://www.bbc.com/news/world-europe-68457087
02/03/2024 22:15:14
QRCode
archive.org
thumbnail

German chancellor promises probe after leak of officers discussing the supply of long-range missiles.

bbc EN 2024 Russia Germany Russia-Ukraine-war leak webex military
NoName057(16) DDoSia project: 2024 updates and behavioural shifts https://blog.sekoia.io/noname05716-ddosia-project-2024-updates-and-behavioural-shifts/
01/03/2024 16:43:41
QRCode
archive.org
thumbnail

Learn about NoName057(16), a pro-Russian hacktivist group behind Project DDoSia targeting entities supporting Ukraine. Discover an overview of the changes made by the group, both from the perspective of the software shared by the group to generate DDoS attacks and the specifics of the evolution of the C2 servers. It also provides an overview of the country and sectors targeted by the group for 2024.

sekoia EN 2024 NoName057(16) DDoSia Analysis
Here Come the AI Worms https://www.wired.com/story/here-come-the-ai-worms/
01/03/2024 16:26:09
QRCode
archive.org
thumbnail

Security researchers created an AI worm in a test environment that can automatically spread between generative AI agents—potentially stealing data and sending spam emails along the way.

wired EN 2024 artificial-intelligence openai google worm
GitHub besieged by millions of malicious repositories in ongoing attack | Ars Technica https://arstechnica.com/security/2024/02/github-besieged-by-millions-of-malicious-repositories-in-ongoing-attack/
01/03/2024 13:23:06
QRCode
archive.org
thumbnail

GitHub keeps removing malware-laced repositories, but thousands remain.

arstechnica EN 2024 github malicious repositories attack
CISA cautions against using hacked Ivanti VPN gateways even after factory resets https://www.bleepingcomputer.com/news/security/cisa-cautions-against-using-hacked-ivanti-vpn-gateways-even-after-factory-resets/
01/03/2024 09:44:05
QRCode
archive.org
thumbnail

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) revealed today that attackers who hack Ivanti VPN appliances using one of multiple actively exploited vulnerabilities may be able to maintain root persistence even after performing factory resets.

bleepingcomputer EN 2024 CISA FBI Ivanti Warning
Failles d’Ivanti : une centaine d’organisations victimes en France https://www.zdnet.fr/actualites/failles-d-ivanti-une-centaine-d-organisations-victimes-en-france-39964604.htm
01/03/2024 09:42:53
QRCode
archive.org
thumbnail

Dans la plupart des cas, les attaquants n’ont pas tenté d’aller plus loin, sauf quelques exceptions. Il s’agissait vraisemblablement pour les attaquants de mettre d’abord un premier pied chez leur cible.

zdnet EN 2024 Ivanti France victimes attaquants
Threat Actors Exploit Multiple Vulnerabilities in Ivanti Connect Connect and Policy Secure Gateways | CISA https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-060b
29/02/2024 19:44:12
QRCode
archive.org

Based upon the authoring organizations’ observations during incident response activities and available industry reporting, as supplemented by CISA’s research findings, the authoring organizations recommend that the safest course of action for network defenders is to assume a sophisticated threat actor may deploy rootkit level persistence on a device that has been reset and lay dormant for an arbitrary amount of time. For example, as outlined in PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure), sophisticated actors may remain silent on compromised networks for long periods. The authoring organizations strongly urge all organizations to consider the significant risk of adversary access to, and persistence on, Ivanti Connect Secure and Ivanti Policy Secure gateways when determining whether to continue operating these devices in an enterprise environment.

CISA EN 2024 Ivanti Vulnerabilities Connect persistence Warning
The Predator spyware ecosystem is not dead https://blog.sekoia.io/the-predator-spyware-ecosystem-is-not-dead/
29/02/2024 13:44:02
QRCode
archive.org
thumbnail

Discover our TDR team's revelations about Predator spyware: its C2 infrastructure and list of countries still using its cyber espionage tool.

sekoia En 2024 Predator spyware Angola Madagascar Indonesia Kazakhstan Egypt Botswana Mongolia Sudan
page 66 / 76
4677 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio